The CISA designation is a globally recognized certification for IS audit control, assurance and security professionals.
Being CISA-certified showcases your audit experience, skills and knowledge, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within the enterprise.
Course Objectives
Upon completion of this course, trainees should be able to:
Develop and implement a risk-based IT audit strategy in compliance with IT audit standards
Evaluate the effectiveness of an IT governance structure
Ensure that the IT organizational structure and human resources (personnel) management support the organization’s strategies and objectives
Review the information security policies, standards, and procedures for completeness and alignment with generally accepted practices
Certificate Description
A trainee must complete the course with attendance rate over 80% to obtain a certification in Certified Information Systems Auditor.
Target Attendence
Audit Managers
IT Managers
Internal and External Audit Staff
Risk Management Staff
Business and Finance Professionals
Private and Public Accountants (CPA's)
IT Professionals
Information Security Professionals
Domain 1: Information Systems Auditing Process | 21%
Planning
IS Audit Standards, Guidelines, and Codes of Ethics
Business Processes
Types of Controls
Risk-Based Audit Planning
Types of Audits and Assessments
Execution
Audit Project Management
Sampling Methodology
Audit Evidence Collection Techniques
Data Analytics
Reporting and Communication Techniques
Domain 2: Governance and Management of IT | 17%
IT Governance
IT Governance and IT Strategy
IT-Related Frameworks
IT Standards, Policies, and Procedures
Organizational Structure
Enterprise Architecture
Enterprise Risk Management
Maturity Models
Laws, Regulations, and Industry Standards affecting the Organization
IT Management
IT Resource Management
IT Service Provider Acquisition and Management
IT Performance Monitoring and Reporting
Quality Assurance and Quality Management of IT
Domain 3: Information Systems Acquisition, Development, and Implementation | 12%
Information Systems Acquisition and Development
Project Governance and Management
Business Case and Feasibility Analysis
System Development Methodologies
Control Identification and Design
Information Systems Implementation
Testing Methodologies
Configuration and Release Management
System Migration, Infrastructure Deployment, and Data Conversion
Post-implementation Review
Domain 4: Information Systems Operations and Business Resilience | 23%
Information Systems Operations
Common Technology Components
IT Asset Management
Job Scheduling and Production Process Automation
System Interfaces
End-User Computing
Data Governance
Systems Performance Management
Problem and Incident Management
Change, Configuration, Release, and Patch Management
IT Service Level Management
Database Management
Business Resilience
Business Impact Analysis (BIA)
System Resiliency
Data Backup, Storage, and Restoration
Business Continuity Plan (BCP)
Disaster Recovery Plans (DRP)
Domain 5: Protection of Information Assets | 27%
Information Asset Security and Control
Information Asset Security Frameworks, Standards, and Guidelines
Privacy Principles
Physical Access and Environmental Controls
Identity and Access Management
Network and End-Point Security
Data Classification
Data Encryption and Encryption-Related Techniques
Public Key Infrastructure (PKI)
Web-Based Communication Techniques
Virtualized Environments
Mobile, Wireless, and Internet-of-Things (IoT) Devices
The CISA examinations are administered at authorized PSI testing centers globally, and the closest locations are located in Lebanon and Jordan
Exam Date And Time
The CISA exam is offered in June and December
Exam Language
English
OVERVIEW
The CISA credential elevates your standing in information technology, information systems, information security and internal auditing, boosting your career opportunities and earning you increased credibility and respect within the profession and your organization.
The CISA credential elevates your standing in information technology, information systems, information security and internal auditing, boosting your career opportunities and earning you increased credibility and respect within the profession and your organization.
Course Description
The CISA designation is a globally recognized certification for IS audit control, assurance and security professionals.
Being CISA-certified showcases your audit experience, skills and knowledge, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within the enterprise.
Course Objectives
Upon completion of this course, trainees should be able to:
Develop and implement a risk-based IT audit strategy in compliance with IT audit standards
Evaluate the effectiveness of an IT governance structure
Ensure that the IT organizational structure and human resources (personnel) management support the organization’s strategies and objectives
Review the information security policies, standards, and procedures for completeness and alignment with generally accepted practices
Certificate Description
A trainee must complete the course with attendance rate over 80% to obtain a certification in Certified Information Systems Auditor.
Target Attendence
Audit Managers
IT Managers
Internal and External Audit Staff
Risk Management Staff
Business and Finance Professionals
Private and Public Accountants (CPA's)
IT Professionals
Information Security Professionals
Outlines
Domain 1: Information Systems Auditing Process | 21%
Planning
IS Audit Standards, Guidelines, and Codes of Ethics
Business Processes
Types of Controls
Risk-Based Audit Planning
Types of Audits and Assessments
Execution
Audit Project Management
Sampling Methodology
Audit Evidence Collection Techniques
Data Analytics
Reporting and Communication Techniques
Domain 2: Governance and Management of IT | 17%
IT Governance
IT Governance and IT Strategy
IT-Related Frameworks
IT Standards, Policies, and Procedures
Organizational Structure
Enterprise Architecture
Enterprise Risk Management
Maturity Models
Laws, Regulations, and Industry Standards affecting the Organization
IT Management
IT Resource Management
IT Service Provider Acquisition and Management
IT Performance Monitoring and Reporting
Quality Assurance and Quality Management of IT
Domain 3: Information Systems Acquisition, Development, and Implementation | 12%
Information Systems Acquisition and Development
Project Governance and Management
Business Case and Feasibility Analysis
System Development Methodologies
Control Identification and Design
Information Systems Implementation
Testing Methodologies
Configuration and Release Management
System Migration, Infrastructure Deployment, and Data Conversion
Post-implementation Review
Domain 4: Information Systems Operations and Business Resilience | 23%
Information Systems Operations
Common Technology Components
IT Asset Management
Job Scheduling and Production Process Automation
System Interfaces
End-User Computing
Data Governance
Systems Performance Management
Problem and Incident Management
Change, Configuration, Release, and Patch Management
IT Service Level Management
Database Management
Business Resilience
Business Impact Analysis (BIA)
System Resiliency
Data Backup, Storage, and Restoration
Business Continuity Plan (BCP)
Disaster Recovery Plans (DRP)
Domain 5: Protection of Information Assets | 27%
Information Asset Security and Control
Information Asset Security Frameworks, Standards, and Guidelines
Privacy Principles
Physical Access and Environmental Controls
Identity and Access Management
Network and End-Point Security
Data Classification
Data Encryption and Encryption-Related Techniques
Public Key Infrastructure (PKI)
Web-Based Communication Techniques
Virtualized Environments
Mobile, Wireless, and Internet-of-Things (IoT) Devices